Installation and Configuration of Lansweeper
Installation and Configuration of Lansweeper
com
1/46
www.lansweeper.com
Prerequisites
Web server:
Windows 2000 or higher with Internet Information services installed or the Lansweeper build-in web server.
The dotnet framework 2.0 installed (latest service pack).
Database server:
Windows 2000 or higher (32 and 64 bit)
SQL server 2000 SP4 or higher (or the free SQL express)
Clients:
Windows 2000 and above
(Windows 9x clients are not supported)
Evenlog scanning is not supported on windows 2000.
In this example the web console, database and service are installed on the same machine.
Website: http://www.lansweeper.com
Support: http://www.lansweeper.com/forum
Skype : Lansweeper
2/46
www.lansweeper.com
Set the SQL server Browser to automatic and start it (if not already started)
Restart the SQL service.
3/46
www.lansweeper.com
Installing Lansweeper
4/46
www.lansweeper.com
You can choose to install Database, Service and Website on different servers if you want; in this example we are
going to install everything on one server.
Sqlcmd: Error: Microsoft SQL Native Client: An error has occurred while establishing a connection to the server. When
connecting to SQL Server 2005, this failure may be caused by the fact that under the default settings SQL Server does not
allow remote connections.
5/46
www.lansweeper.com
The user running the service should have administrative privileges on all clients being scanned by
lansweeper.
Workgroup:
Domain:
6/46
www.lansweeper.com
If IIS is installed the installer will suggest to use this as a web server.
If you are already using any web applications on the server we recommend creating a new website on a new port.
If IIS is not installed you can choose the lansweeper build-in web server.
7/46
www.lansweeper.com
When setup completes you will be able to subscribe to our newsletter to get news about updates, patches &
tutorials.
(Not required but recommended)
8/46
www.lansweeper.com
Surf to your server where the Lansweeper service is running (not the website) http://servername:9524
If there are any errors, the errorlog.txt file is in your service folder:
9/46
www.lansweeper.com
You can use integrated authentication or you can connect with a username and password:
Username: lansweeperuser
Default password: mysecretpassword0*
You can change the default password of the SQL user later if you want.
10/46
www.lansweeper.com
Configuring all scanning options.
If you have the enterprise your can have multiple scanning servers each with their own configuration.
If you want to use e-mail alerts it’s important to specify an e-mail relay server in your configuration.
If you want to change the lansweeper port or concurrent scans you will need to restart your service after saving
the changes.
11/46
www.lansweeper.com
Active scanning allows you to scan multiple domain and selected OU’s without the need to install any client on the
workstations.
Active scanning works like a “set it and forget it” option, it will query your domain controllers to find out recently
connected workstations and servers.
12/46
www.lansweeper.com
IP range scanning can discover network devices in your network which have the SNMP, SSH, HTTP, HTTPS, FTP,
SMTP, SIP, Telnet or Jetdirect protocol enabled.
If you are scanning a workgroup you can also discover and scan windows computers.
There is no client or extra software needed on your computers.
Multiple default domains and credentials can be configured for each IP range.
Use this scanning option to incrementally update your server’s eventlog and generate the necessary alerts in time.
There is no client or extra software needed on your computers.
13/46
www.lansweeper.com
Scheduled scanning allows for scanning computers, complete domains or OU’s at scheduled time intervals.
There is no client or extra software needed on your computers.
14/46
www.lansweeper.com
Although the name would suggest otherwise lsclient.exe is no real client or agent.
Basically it just sends a message to the server “hello, I’m here, scan me on this IP Address” and stops working.
The service queue’s this request and starts scanning the client when ready.
All the scanning is done by the lansweeper service.
/scanonip is a new option. You can use it if you have vpn clients and want to scan them on the IP address they
currently have without the need to have DNS updated.
15/46
www.lansweeper.com
How to use lsclient in a standard login script?
%logonserver%\netlogon\lsclient.exe myserver
16/46
www.lansweeper.com
Deploying lsclient by using a GPO
Make sure that you use a logon script instead of a startup script because this is running in the context
of the user.
A sample vbs script that runs the lsclient hidden could look like this:
17/46
www.lansweeper.com
On this page you can specify alternate credentials to scan other domains and forests.
If you want to use credentials from a computer that cannot be verified (example: a DMZ standalone computer) you
can check the box “Don’t try to authenticate username\password”
18/46
www.lansweeper.com
You can connect from the server to one of the clients to check if the WMI settings and access permissions are ok.
The test checks if WMI access and registry access using WMI
is possible.
19/46
www.lansweeper.com
For example:
Cdrom = 60
Information about cdroms is only scanned every 60 days.
20/46
www.lansweeper.com
If you wish to exclude some computers from scanning you can add them to this list.
21/46
www.lansweeper.com
3 types of keys are currently supported: Plain text, Microsoft and Adobe.
Keys in the HKEY_CURRENT_USERS registry key are not supported.
22/46
www.lansweeper.com
You can add your website to the trusted sites for security reasons.
23/46
www.lansweeper.com
You can disable/enable the plugin afterwards from the firefox menu/tools/add-ons.
24/46
www.lansweeper.com
Select all the computers in the grid (ctrl & shift) for multiple selections.
25/46
www.lansweeper.com
With the dropdown box you can select from all the available reports in the database.
Sort order = the lower the number, the higher the report will be displayed in the interface
Priority 1 : High priority
Priority 2 : Important
Priority 3 : Informational
Color = show in red if the report contains items
Show % = shows the percentage of computers contained in this report
26/46
www.lansweeper.com
Creating your own reports
27/46
www.lansweeper.com
Drag the 2 needed table “tblcomputer” and “tblsoftware” to the query builder and select the needed fields.
Our report is now available and can be exported to Excel, Csv, XML, …
28/46
www.lansweeper.com
When this is done we can select the reports we want e-mailed en choosing a group for them.
Selected reports will be mailed each night if they contain any results.
Empty reports will not be mailed.
29/46
www.lansweeper.com
If you want to receive e-mail alerts if an error happens on one of your servers you can use the eventlog alerts.
You can specify multiple alerts each with their own mailgroup and filters.
30/46
www.lansweeper.com
Ignoring eventlog events
31/46
www.lansweeper.com
On the left you see all the software found in your network.
If you want to track license usage of a software item, you can select it and add it to the list of tracked software.
In the details you can select multiple versions and products for one license type.
You can use the wildcard ‘%’ in the version to specify multiple versions.
32/46
www.lansweeper.com
On the left you see all the windows operating systems found in your network.
If you want to track license usage of an operating system, you can select it and add it to the list of tracked
Operating systems.
33/46
www.lansweeper.com
Computer actions:
User actions:
34/46
www.lansweeper.com
Device actions:
You can add your own icons to the “actions” folder in the web folder.
35/46
www.lansweeper.com
Configuring extra scanned files
File size, company, version and other info is scanned for this file.
Results of these file scans can be used to create custom reports using the premium report builder.
Examples:
Which computer doesn’t have the latest version of Firefox installed?
Which computer doesn’t have the latest version of Antivirus scanner X?
Which computer doesn’t have the needed DLL for application X?
36/46
www.lansweeper.com
37/46
www.lansweeper.com
Add all users that are allowed to be local administrator on their computer to this list.
This will help you with the report : “Not allowed local administrators”
38/46
www.lansweeper.com
You can use the {assettag} and {model} parameter to link to computer vendors support pages.
After purchase you will receive a license key which you can copy/paste into this screen.
If you can’t find your license key, please contact us at lansweeper@hemoco.com and provide your orderID.
39/46
www.lansweeper.com
If you want to add pictures for your users you can add them in the pictures folder of your web server:
Folder = NetBIOS name of your domain (change this to reflect the name of your domains)
Picture = username.jpg (SamAccountname)
40/46
www.lansweeper.com
Use this tool to force/trigger remote scanning of a workstation from the command line.
Example:
lstrigger "servername" "computer" "domain"
Default port = 9524
Change “servername” to the name of the server running your lansweeper service.
When you trigger a scan all information for this computer is rescanned regardless of the waittime set.
41/46
www.lansweeper.com
You can also use this program from the command line or from the action screen.
Usage:
screengrab.exe {computer}
42/46
www.lansweeper.com
Premium tool: Remote control - Take remote control of your workstations by pushing VNC.
Remote control the screen of your workstations to give them remote support.
The free VNC service is automatically pushed to the client on first use.
You can also use this program from the command line or from the action screen.
Usage:
lsremote.exe {computer}
43/46
www.lansweeper.com
Premium tool: Remote software uninstall – list and uninstall software on remote computers.
You can also use this program from the command line or from the action screen.
Usage:
remoteuninst.exe {computer}
The only requirement is WMI and administrative rights on the remote computer.
MSI packages:
These are uninstalled by the MSIexec command.
Adding the /QN /NORESTART parameters makes the uninstall invisible to the remote users.
Other installers:
They might have optional parameters to run the uninstall hidden but this depends on the software and is not
always available.
44/46
www.lansweeper.com
LSrunase 2.0 can be used to run a command using another user account and passing the password as a
parameter.
Parameters:
1e parameter: specifies the username
2e parameter: specifies the domain
3e parameter: specifies the encrypted password
4e parameter: specifies the command
5e parameter: specifies the optional parameters
Examples:
lsrunase administrator Mydomain vA0j26NYqfc= notepad.exe
45/46
www.lansweeper.com
Premium tool: Supercrypt : enhanced encrypted runas tool.
In this example we make the notepad.lsc file to start notepad with administrator privileges.
You can then use these encrypted .lsc files with Supercrypt to run the chosen program using the chosen account.
The executable variable makes sure that only the intended program can be run as administrator.
The technique for doing this is calculating the MD5 hash value of the executable (in this case notepad.exe).
Supercrypt makes sure that the user can only run the program it was intended to run!
Example:
supercrypt "c:\notepad.lsc"
46/46